Chapter 2 Introduction
Thanks for choosing the TL-SL5428E 24-Port 10/100Mbps + 4-Port Gigabit JetStream L2
Managed Switch!
2.1 Overview of the Switch
Designed for workgroups and departments, TL-SL5428E from TP-LINK provides wire-speed
performance and full set of layer 2 management features. It provides a variety of service features
and multiple powerful functions with high security.
The EIA-standardized framework and smart configuration capacity can provide flexible solutions
for a variable scale of networks. ACL, 802.1x, IP Source Guard and Dynamic ARP Inspection
provide robust security strategy. QoS and IGMP snooping/filtering optimize voice and video
application. Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of
business critical data. SNMP, RMON, WEB/CLI/Telnet Log-in bring abundant management
policies. TL-SL5428E switch integrates multiple functions with excellent performance, and is
friendly to manage, which can fully meet the need of the users demanding higher networking
performance.
2.2 Main Features
Resiliency and Availability
+ Link aggregation (LACP) increases aggregated bandwidth, optimizing the transport of
business critical data.
+ IEEE 802.1s Multiple Spanning Tree provides high link availability in multiple VLAN
environments.
+ Multicast snooping automatically prevents flooding of IP multicast traffic.
+ Root Guard protects root bridge from malicious attack or configuration mistakes
Layer 2 Switching
+ GVRP (GARP VLAN Registration Protocol) allows automatic learning and dynamic
assignment of VLANs.
+ Supports up to 4K VLANs simultaneously (out of 4K VLAN IDs).
Quality of Service
+ Supports L2/L3 granular CoS with 4 priority queues per port.
+ Rate limiting confines the traffic flow accurately according to the preset value.
Security
+ Supports multiple industry standard user authentication methods such as 802.1x, RADIUS.
+ IP Source Guard prevents IP spoofing attacks.
+ Dynamic ARP Inspection blocks ARP packets from unauthorized hosts, preventing
man-in-the-middle attacks.
+ L2/L3/L4 Access Control Lists restrict untrusted access to the protected resource.
+ Provides SSHv1/v2, SSL 2.0/3.0 and TLS v1 for access encryption.
6